Bug 129322 (CVE-2005-3425) - VUL-0: CVE-2005-3425: gnump3d cross-site-scripting and directory traversal
Summary: VUL-0: CVE-2005-3425: gnump3d cross-site-scripting and directory traversal
Status: RESOLVED FIXED
: CVE-2005-3123 (view as bug list)
Alias: CVE-2005-3425
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVE-2005-3425: CVSS v2 Base Score: 4....
Keywords:
Depends on:
Blocks:
 
Reported: 2005-10-19 10:05 UTC by Thomas Biege
Modified: 2021-11-22 10:23 UTC (History)
2 users (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
gnump3d-xss.diff (945 bytes, patch)
2005-10-19 10:06 UTC, Thomas Biege
Details | Diff
gnump3d-dot-dot.diff (497 bytes, patch)
2005-10-19 10:06 UTC, Thomas Biege
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Biege 2005-10-19 10:05:10 UTC
Hello Thorsten,
we received this via vendor-sec.

From: Steve Kemp <skx@debian.org>
Cc: vendor-sec@lst.de
User-Agent: Mutt/1.5.9i
Subject: [vendor-sec] GNUMP3d XSS + Directory traversal
Errors-To: vendor-sec-admin@lst.de
Date: Mon, 17 Oct 2005 21:40:27 +0100

[-- PGP Ausgabe folgt (aktuelle Zeit: Mi 19 Okt 2005 12:02:52 CEST) --]
gpg: Unterschrift vom Mo 17 Okt 2005 22:40:27 CEST, DSA SchlÃŒssel ID CD4C0D9D
gpg: Unterschrift kann nicht geprÃŒft werden: Ãffentlicher SchlÃŒssel nicht gefunden
[-- Ende der PGP-Ausgabe --]

[-- Die folgenden Daten sind signiert --]

[-- Anhang #1 --]
[-- Typ: text/plain, Kodierung: quoted-printable, GröÃe: 1,8K --]



  I'm aware of several distributions containing the
 GNUMP3d package, for serving MP3 files.

  In the interests of a coordinated release I'm suggesting
 a disclosure date of Friday 28th October which will coincide
 with a new upstream release.

  If that will cause problems let me know.



1. XSS Attacks [ CAN-2005-3122 ]
--------------------------------

  There are two XSS attack vectors in the handling of files.

  When files are not found the requested URI isn't stripped from
 the 404 page, allowing javascript execution via:

        http://host:port/not-present/<script>..</script>

  The second flaw comes from a similar refusal to serve any request ending
 in the string '.password'.  Internally this is an identical vulnerability
 as the request is coverted into a 404 response regardless of whether the
 file exists or not:

        http://host:port/any/path/<script>...</script>/.password



  Patch attached 'gnump3d-xss.diff'.



2. Directory Traversal [CAN-2005-3123]
--------------------------------------

  This is a far more serious flaw, which allows the reading of
 arbitary files which the user the server is running as has access to.
 (gnump3d - by default).

  The flaw comes from the attempt to sanitize input paths, ironically
 to prevent these very attacks.

  The process looks like this:

        Strip ".." from all inputted paths.
        Then strip "//" from all inputted paths.

  This allows the following conversion to happen:

        /.//./
        /../

  So with the root set to /home/mp3 the following allows the password
 file to be retrieved:

GET /.//.///.//./etc/passwd HTTP/1.0

  The solution chosen is to :

        1.  Strip "/../" only from the input paths.  And for Windows: (\..\).

  Patch attached, gnump3d-dot-dot.diff

  Apologies to all affected vendors.

Steve
--

[-- Anhang #2: gnump3d-dot-dot.diff --]
[-- Typ: text/plain, Kodierung: quoted-printable, GröÃe: 0,5K --]
Comment 1 Thomas Biege 2005-10-19 10:06:40 UTC
Created attachment 54722 [details]
gnump3d-xss.diff
Comment 2 Thomas Biege 2005-10-19 10:06:57 UTC
Created attachment 54723 [details]
gnump3d-dot-dot.diff
Comment 3 Thorsten Kukuk 2005-10-27 09:07:23 UTC
*** Bug 130963 has been marked as a duplicate of this bug. ***
Comment 4 Ludwig Nussel 2005-10-27 09:18:34 UTC
According to this mail CRD is tomorrow.

Maintenance-Tracker-2689
Comment 5 Thomas Biege 2005-11-04 07:21:01 UTC
ping
Comment 7 Ludwig Nussel 2005-11-04 08:41:08 UTC
Don't forget that when we get bad statistics from lwn.net.
Comment 8 Ludwig Nussel 2005-11-07 10:53:11 UTC
CVE-2005-3424
CVE-2005-3425

CVE-2005-3122 has been rejected. don't use.
Comment 9 Ludwig Nussel 2005-11-09 13:16:23 UTC
one testcase is
http://localhost:8888/etc/passwd?theme=../../../../
Comment 10 Ludwig Nussel 2005-11-21 09:08:13 UTC
CVE-2005-3349 - /tmp issue
CVE-2005-3355 - directory traversal via theme parameter
Comment 11 Ludwig Nussel 2005-11-22 09:31:47 UTC
packages released
Comment 12 Thomas Biege 2009-10-13 21:42:32 UTC
CVE-2005-3425: CVSS v2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)